• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Outline the Data Protection Act and give examples of breaches.

Extracts from this document...


´╗┐MATTHEW ALLEN N5 Data Protection Act What is it? With the growth of information in technology, large databases are needed to hold the huge amounts of information. Global networks are used to share and distribute this information around the world in seconds. In order to control this and to protect people?s right to privacy, the Data Protection Act was introduced in 1984. The 8 basic principles: http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles Data should? 1. Not be transferred to countries that do not have suitable data protection laws - There are similar data protection rules in all European Union countries. It is therefore acceptable to transfer personal data to another EU country, as it will still be protected. However, this principle refers to the European Economic Area (EEA) - this includes Iceland, Norway and Liechtenstein. (http://www.soas.ac.uk/infocomp/dpa/policy/outside/). Others countries, such as the United States, have not got suitable data protection laws either so personal data should not be sent to these countries. ...read more.


1. Be processed within the rights of data subjects - There are other vital privacy rights, as well as the Data Protection Act. These include the right to confidentiality. These affect how personal information can be used by companies. 1. Be obtained for specified and lawful purposes - This adds that the company must have a specific reason for processing data. Also, the data can only be processed for that purpose and no other. 1. Be adequate, relevant and not excessive for the purpose - This means that companies should collect the right amount of information for the fulfil purpose - no more and no less. In order to check whether they are collecting too much data, they look at the data and consider which pieces of information are absolutely critical in order to enable them to do whatever it is they are trying to do. Whatever is left can't be critical, so it would be unnecessary and it therefore should be disposed of. ...read more.


The forces could be punished under the data protection act. G4S (the security firm) said all files had been deleted, but this will come as no reassurance as they may not be trustworthy. (http://www.bbc.co.uk/news/uk-england-22265315). A statement said the data sent went over what was required, breaching the data protection act’s principles. This is therefore a breach of the act and a criminal investigation will occur as a result – to see who is to blame before action is taken. 1. A GP's receptionist who accessed sensitive medical information about her ex-husband's new wife has admitted breaching data protection law. She was fined £750. The two medical documents she accessed were referred to as highly confidential. www.publicservice.co.uk/news_story.asp?id=22417. Everybody expects their doctors to be confidential but the information was accessed by someone else. The victim of this crime feels betrayed and vulnerable as someone she barely knows, knows private information about her. What has happened can’t be undone and the fine of £750 will only give a small amount of satisfaction – some will feel that the charge was rather lenient. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Child Protection Act.

    Reform to the Child Protection Act For the Child Protection Act to work as well in reality as it does in theory, certain changes need to be made. Those 95% which said that there was not enough funding or enough officers to deal with the cases, 80% of them answered that more funding should be made to aid this problem.

  2. The Data Protection Act 1998 - questions and answers

    The position has changed under the 1998 Act which provides that notwithstanding that you have registered your purposes you have to meet one of the conditions for processing set out in the 1998 Act before you can carry out the processing.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Not only will this increase the risk of spreading the virus, it'll also tarnish his reputation to fall and spread these viruses. What Mr Ajaib can do to aid against this is to install anti-virus software. His MacAfee trial ran out after 60 days, but if Mr Ajaib purchases it,

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    ways data can be accessed and used in a range of different purposes that could cause problems to the person the data may concern. Another downfall of the data protection act is that some organisation lack a lot in keeping personal information of individuals up to data and accurate.

  1. Data Protection Act

    For example a tour operator which collects names and addresses of customers when they enter a competition cannot keep the data and use it for other promotional activities unless the customer gives permission. The tour operator is not allowed to sell the data to another organisation either.

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    Although it will always be necessary to have some kind of statutory guideline in defining what art is, it doesn't really offer appropriate protection to all contemporary artists where there is a limited amount of description in the statutory provision.

  1. Data Protection Act

    Also data kept by the school must not be kept longer than necessary. When I leave the school the data should be deleted of the computer as it will no longer be necessary for the school to keep it as I am not there anymore.

  2. Right of privacy under Hong Kong's current laws

    A journalist will face criminal charge(s) if s/he improbably collects or uses one's personal data. The cases Eastweek v. Privacy Commissioner11 and undercover agent case12 has shed some light on the use of DDP: allowing journalists to take photographs of unidentified people, and disallowing them to publish details of undercover agent.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work